Sciweavers

448 search results - page 61 / 90
» Who is in Control
Sort
View
137
Voted
ASSETS
2004
ACM
15 years 9 months ago
Designing a cognitive aid for the home: a case-study approach
Cognitive impairments play a large role in the lives of surviviors of mild traumatic brain injuries who are unable to return to their prior level of independence in their homes. C...
Jessica Paradise, Elizabeth D. Mynatt, Cliff Willi...
98
Voted
ICALT
2003
IEEE
15 years 9 months ago
Students' Understanding of Computer Networks in an Internationally Distributed Course
The different ways in which concepts within computer networks are understood by master level students who take an internationally distributed project-based course have been identi...
Anders Berglund, Arnold Neville Pears
123
Voted
UIST
2003
ACM
15 years 9 months ago
TiltText: using tilt for text input to mobile phones
TiltText, a new technique for entering text into a mobile phone is described. The standard 12-button text entry keypad of a mobile phone forces ambiguity when the 26letter Roman a...
Daniel Wigdor, Ravin Balakrishnan
110
Voted
CCS
2003
ACM
15 years 9 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
130
Voted
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 8 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman